Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 43.20.68.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31382
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;43.20.68.134.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020601 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 05:11:26 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 134.68.20.43.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.68.20.43.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
198.108.67.39 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-28 01:11:12
118.25.99.101 attackspam
Dec 27 05:44:14 web9 sshd\[3019\]: Invalid user dnsuser from 118.25.99.101
Dec 27 05:44:14 web9 sshd\[3019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.99.101
Dec 27 05:44:17 web9 sshd\[3019\]: Failed password for invalid user dnsuser from 118.25.99.101 port 52630 ssh2
Dec 27 05:48:22 web9 sshd\[3717\]: Invalid user nnjoki from 118.25.99.101
Dec 27 05:48:22 web9 sshd\[3717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.99.101
2019-12-28 01:17:26
154.193.161.153 attack
Dec 27 15:50:29 grey postfix/smtpd\[4858\]: NOQUEUE: reject: RCPT from unknown\[154.193.161.153\]: 554 5.7.1 Service unavailable\; Client host \[154.193.161.153\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[154.193.161.153\]\; from=\ to=\ proto=ESMTP helo=\
...
2019-12-28 01:22:14
41.78.83.32 attackspambots
Dec 26 18:14:11 server sshd\[9664\]: Failed password for invalid user ardent from 41.78.83.32 port 50252 ssh2
Dec 27 17:29:48 server sshd\[9460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.78.83.32  user=root
Dec 27 17:29:50 server sshd\[9460\]: Failed password for root from 41.78.83.32 port 60974 ssh2
Dec 27 17:50:38 server sshd\[15521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.78.83.32  user=mail
Dec 27 17:50:39 server sshd\[15521\]: Failed password for mail from 41.78.83.32 port 57964 ssh2
...
2019-12-28 01:13:08
89.222.181.58 attackspambots
Dec 27 17:58:09 h2177944 sshd\[10750\]: Invalid user ssh from 89.222.181.58 port 35966
Dec 27 17:58:09 h2177944 sshd\[10750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.222.181.58
Dec 27 17:58:11 h2177944 sshd\[10750\]: Failed password for invalid user ssh from 89.222.181.58 port 35966 ssh2
Dec 27 18:01:31 h2177944 sshd\[10829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.222.181.58  user=root
...
2019-12-28 01:41:41
140.143.72.21 attackbotsspam
$f2bV_matches
2019-12-28 01:14:10
27.78.14.83 attack
frenzy
2019-12-28 01:41:56
94.177.253.34 attackbotsspam
3389BruteforceFW23
2019-12-28 01:23:32
186.91.141.78 attack
Unauthorized access or intrusion attempt detected from Thor banned IP
2019-12-28 01:42:50
100.1.248.44 attackbotsspam
tcp 9000
2019-12-28 01:21:09
185.184.79.31 attack
Dec 27 18:22:25 debian-2gb-nbg1-2 kernel: \[1120068.043022\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.184.79.31 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=19005 PROTO=TCP SPT=60000 DPT=6000 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-28 01:30:14
121.40.65.218 attackbots
SIP/5060 Probe, BF, Hack -
2019-12-28 01:12:06
111.43.223.17 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-28 01:35:35
159.65.8.65 attackspam
$f2bV_matches
2019-12-28 01:29:15
77.123.155.201 attack
SSH bruteforce (Triggered fail2ban)
2019-12-28 01:03:10

Recently Reported IPs

223.251.141.96 193.130.233.203 12.171.12.16 219.91.215.86
118.50.252.255 207.207.234.192 84.168.141.168 77.18.248.48
46.13.115.102 237.83.116.65 175.220.43.177 182.105.241.65
203.70.247.78 80.254.150.216 81.104.83.139 243.132.98.20
169.239.96.253 46.138.96.194 218.70.107.130 95.66.6.87